|Name ||Try Common(default) Usernames and Passwords |
|Summary ||An attacker may try certain common (default) usernames and passwords to gain access into the system and perform unauthorized actions. An attacker may try an intelligent brute force using known vendor default credentials as well as a dictionary of common usernames and passwords.
Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. "secret" or "password") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary. |
|Prerequisites ||The system uses one factor password based authentication. |
|Solutions ||Delete all default account credentials that may be put in by the product vendor.
Implement a password throttling mechanism. This mechanism should take into account both the IP address and the log in name of the user.
Put together a strong password policy and make sure that all user created passwords comply with it. Alternatively automatically generate strong passwords for users.
Passwords need to be recycled to prevent aging, that is every once in a while a new password must be chosen. |
|CWE ID ||Description |
|CWE-262 ||Not Using Password Aging |
|CWE-263 ||Password Aging with Long Expiration |
|CWE-521 ||Weak Password Requirements |
|CWE-693 ||Protection Mechanism Failure |
|CWE-798 ||Use of Hard-coded Credentials |